Author of the publication

Scalable Integrity-Guaranteed AJAX.

, , and . APWeb, volume 7235 of Lecture Notes in Computer Science, page 1-19. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis., , , , , , and . USENIX Security Symposium, page 543-558. USENIX Association, (2013)Design, implementation and evaluation of security in iSCSI-based network storage systems., , , , and . StorageSS, page 17-28. ACM, (2006)A Trusted Safety Verifier for Process Controller Code., , , and . NDSS, The Internet Society, (2014)Limiting Sybil Attacks in Structured P2P Networks., , , and . INFOCOM, page 2596-2600. IEEE, (2007)Windowed Certificate Revocation., and . INFOCOM, page 1406-1414. IEEE, (2000)Structured security testing in the smart grid., and . ISCCSP, page 1-4. IEEE, (2012)Trusted declassification: : high-level policy for a security-typed language., , , and . PLAS, page 65-74. ACM, (2006)Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing., , , and . ISCC, page 489-496. IEEE Computer Society, (2006)Kells: a protection framework for portable data., , and . ACSAC, page 231-240. ACM, (2010)TARP: Ticket-based Address Resolution Protocol., , and . ACSAC, page 106-116. IEEE Computer Society, (2005)